Description
A Buffer Overflow issue was discovered in Asterisk through 13.19.1, 14.x through 14.7.5, and 15.x through 15.2.1, and Certified Asterisk through 13.18-cert2. When processing a SUBSCRIBE request, the res_pjsip_pubsub module stores the accepted formats present in the Accept headers of the request. This code did not limit the number of headers it processed, despite having a fixed limit of 32. If more than 32 Accept headers were present, the code would write outside of its memory and cause a crash.
Published: 2018-02-22
Score: 7.5 High
EPSS: 65.2% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-4320-1 asterisk security update
History

No history.

Subscriptions

Debian Debian Linux
Digium Asterisk Certified Asterisk
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T06:24:11.866Z

Reserved: 2018-02-21T00:00:00.000Z

Link: CVE-2018-7284

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-02-22T00:29:01.000

Modified: 2024-11-21T04:11:56.303

Link: CVE-2018-7284

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses